Sciweavers

62 search results - page 9 / 13
» Detecting Service Violations and DoS Attacks
Sort
View
ICC
2009
IEEE
233views Communications» more  ICC 2009»
14 years 2 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi
WICOMM
2008
139views more  WICOMM 2008»
13 years 7 months ago
Struggling against selfishness and black hole attacks in MANETs
Since mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermed...
Djamel Djenouri, Nadjib Badache
IJIPT
2010
147views more  IJIPT 2010»
13 years 6 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
ADHOCNOW
2003
Springer
14 years 1 months ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
IWIA
2006
IEEE
14 years 1 months ago
Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks
Nowadays, voice over IP (VoIP) telephony networks are connected to classic public switched telephony networks (PSTNs). Emergency calls from VoIP peers to PSTN public service answe...
Nils Aschenbruck, Matthias Frank, Peter Martini, J...